CVE-2017-7995

Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html Third Party Advisory
http://www.securityfocus.com/bid/98314 Third Party Advisory VDB Entry
https://bugzilla.suse.com/show_bug.cgi?id=1033948 Issue Tracking Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*

History

No history.

Information

Published : 2017-05-03 19:59

Updated : 2024-02-28 15:44


NVD link : CVE-2017-7995

Mitre link : CVE-2017-7995

CVE.ORG link : CVE-2017-7995


JSON object : View

Products Affected

novell

  • suse_linux_enterprise_point_of_sale
  • suse_linux_enterprise_server

suse

  • manager
  • openstack_cloud
  • manager_proxy

xen

  • xen
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor